CVE-2021-43821
Vulnerability from cvelistv5
Published
2021-12-14 19:15
Modified
2024-08-04 04:03
Severity ?
EPSS score ?
Summary
Files Accessible to External Parties in Opencast
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:03:08.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "opencast", "vendor": "opencast", "versions": [ { "status": "affected", "version": "\u003c 10.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Opencast is an Open Source Lecture Capture \u0026 Video Management for Education. Opencast before version 9.10 or 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast\u0027s host machines and making them available via the web interface. Before Opencast 9.10 and 10.6, Opencast would open and include local files during ingests. Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. The issue has been fixed in Opencast 10.6 and 11.0. You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552: Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-14T19:15:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587" }, { "tags": [ "x_refsource_MISC" ], "url": "https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl" } ], "source": { "advisory": "GHSA-59g4-hpg3-3gcp", "discovery": "UNKNOWN" }, "title": "Files Accessible to External Parties in Opencast", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-43821", "STATE": "PUBLIC", "TITLE": "Files Accessible to External Parties in Opencast" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "opencast", "version": { "version_data": [ { "version_value": "\u003c 10.6" } ] } } ] }, "vendor_name": "opencast" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Opencast is an Open Source Lecture Capture \u0026 Video Management for Education. Opencast before version 9.10 or 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast\u0027s host machines and making them available via the web interface. Before Opencast 9.10 and 10.6, Opencast would open and include local files during ingests. Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. The issue has been fixed in Opencast 10.6 and 11.0. You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-552: Files or Directories Accessible to External Parties" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp", "refsource": "CONFIRM", "url": "https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp" }, { "name": "https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764", "refsource": "MISC", "url": "https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764" }, { "name": "https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587", "refsource": "MISC", "url": "https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587" }, { "name": "https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl", "refsource": "MISC", "url": "https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl" } ] }, "source": { "advisory": "GHSA-59g4-hpg3-3gcp", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-43821", "datePublished": "2021-12-14T19:15:12", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-04T04:03:08.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-43821\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-12-14T20:15:07.617\",\"lastModified\":\"2021-12-20T20:48:12.830\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Opencast is an Open Source Lecture Capture \u0026 Video Management for Education. Opencast before version 9.10 or 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast\u0027s host machines and making them available via the web interface. Before Opencast 9.10 and 10.6, Opencast would open and include local files during ingests. Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. The issue has been fixed in Opencast 10.6 and 11.0. You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating.\"},{\"lang\":\"es\",\"value\":\"Opencast es un software de c\u00f3digo abierto para la captura de conferencias y la administraci\u00f3n de v\u00eddeo para la educaci\u00f3n. Opencast versiones anteriores a 9.10 o 10.6, permite referencias a URLs de archivos locales en paquetes de medios ingeridos, permitiendo a atacantes incluir archivos locales de las m\u00e1quinas anfitrionas de Opencast y hacerlos disponibles por medio de la interfaz web. En versiones anteriores a Opencast 9.10 y 10.6, Opencast abr\u00eda e inclu\u00eda archivos locales durante las ingestas. Los atacantes pod\u00edan aprovechar esto para incluir la mayor\u00eda de los archivos locales a los que el proceso tuviera acceso de lectura, extrayendo secretos de la m\u00e1quina anfitriona. Un atacante necesitar\u00eda tener los privilegios necesarios para a\u00f1adir nuevos medios para explotar esto. Sin embargo, estos suelen ser ampliamente otorgados. El problema se ha corregido en Opencast versiones 10.6 y 11.0. Puede mitigar este problema limitando el acceso de lectura que Opencast posee a los archivos del sistema de archivos mediante permisos UNIX o sistemas de control de acceso obligatorios como SELinux. Sin embargo, esto no puede impedir el acceso a los archivos que Opencast necesita leer, por lo que recomendamos encarecidamente la actualizaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":4.0},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-552\"}]},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-552\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.6\",\"matchCriteriaId\":\"8AFC8FC9-B836-439D-96C4-6DD80FFFB37F\"}]}]}],\"references\":[{\"url\":\"https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.